Compute points for Acronis Disaster Recovery Overview In Acronis Disaster Recovery, compute points are used for primary servers and recovery servers during test failover and production...
Backup Encryption – Acronis Overview We recommend that you encrypt all backups that are stored in the cloud storage, especially if your company is...
How to create a disaster recovery protection plan in Acronis Overview You can create a protection plan that includes the Acronis Disaster Recovery module and apply it to your devices....
Working with the Cyber Protection service console – Acronis Overview In the Acronis Cyber Protection console, you can manage workloads and plans, change the protection settings, configure reports, or...
Applying a plan to a group – Acronis Overview In Acronis Cyber Protect Cloud, you can apply a plan to a group by selecting the group first, and...
Applying a protection plan to a workload – Acronis Overview To protect a workload in Acronis Cyber Protect Cloud, you must apply a protection plan to it. How to...
Accessing the Cyber Protection service – Acronis Overview After you activate your Acronis account, you can access the Cyber Protection service by logging in to Acronis Cyber...
How to Manage Email Account Restrictions on cPanel Overview In cPanel, you have the ability to control access and functionality for each email account. This includes enabling or...
Using Email via Webmail in cPanel One of the things that helps maintain your domain name via cPanel is that you also get the ability to create custom email accounts for...
Creating an Email Signature in Webmail What is Webmail? Using Webmail, you can access your email through a web browser (such as Chrome, Firefox, or Internet...